MOSCOW STATE INSTITUTE OF INTERNATIONAL RELATIONS (М

advertisement
MOSCOW STATE INSTITUTE OF INTERNATIONAL RELATIONS
(Ì GIM 0- UNlVERSITY),
ÒÍÅ MINISTRY OF FOREIGN AFFAIRS OF RUSSIA
Â.À. in Government and International Affairs
School of Government and International Affairs
Department îÑ Political Theory
«Approved»
Vice
for Educational Development
,
À. Khudaykulova
«
2014
IT and Internet Ñîò munications in Governance
ÒÜåcourseprogram developedÜóAgeychev À., 2014
@AgeychevA., 2014
@MGIMO-University,2014
The course “IT and Internet Communications in Governance” is elaborated in
accordance with the MGIMO Educational Standard for the Bachelor’s Program in
International Affairs (program track “Government and International Affairs”).
Authors___________________________________ A. Ageychev and S. Apetyan
Director of the MGIMO library______________________ Marina Reshetnikova
The program is approved by Department of Political Theory on
_____________________________
Head of Department__________________________ Prof. Tatyana Alekseeva, Ph.D.
© A. Ageychev and S. Apetyan, 2014
© MGIMO-University, 2014
2
PART 1:
INSTRUCTOR INFORMATION, COURSE DESCRIPTION
AND TEACHING METHODS
•
•
•
•
•
•
1.1 General information
Full course title: IT and Internet Communications in Governance
Type of course: Compulsory
Level of course: B.A.
Year of study: 1st
Number of ECTS credits allocated: 1
Name of lecturer(s) and office hours:
Anton Ageychev, Department of Political Theory (MGIMO), Fellow
Stanislav Apetyan, The Foundation for Civil Society Development, Expert
Office hours: Thursday 1PM-4PM, office 3024
E-mail: ageychev@hotmail.com, tezpr@mail.ru
1.2 Course aims and learning outcomes
The aims of the course are to provide students with foundational knowledge and understanding of
the place and role of Internet communications in the modern world, their influence on socio-cultural
and political behavior, to introduce students to basic principles of functioning of the Internet, to
provide students with understanding of Internet management, administration and governance
principles.
Learning outcomes:
By the end of this course students should be able to:
• know the structure and principles of functioning of the Internet, key actors in the sphere of
digital technologies;
• acquire knowledge of the essence and structure of information processes in modern societies;
• navigate freely in information flows and choose quality content;
• be familiar with conducting search, storage, processing and submission of information;
• understand the principles of interaction and cooperation of government and business on
Internet issues;
• be able to analyze modern problems connected with the development of the Internet.
1.3 Course requirements and grading plan
Course requirements
Students will be required to attend not less than 90% of classes and be prepared for class
discussions. Conscientious reading of the assigned materials is compulsory. Grading plan
• Class participation – 30%
Students are expected to attend all the lectures seminars and participate in class discussions;
since the course is highly interactive, it is essential that students attend the seminars having
read the materials for that day’s class. • In-class business case presentation and case study – 30%.
Students are expected to prepare short review of popular website, start-up or Internet
service. The review can be prepared either in “Power Point” format or orally. Case should
describe history of a project, include information about its owners, short review of the
market sphere where it works and assessments of the student. Business cases will be
discussed by students after the presentation. By the end of the discussion students will be
3
divided in two groups, each of which should propose their own ideas and short conception
of similar Internet project. The advantages and disadvantages of proposed business models
and cases will be thought over together with the lecturer. • In-class practice task – 20%
Using computers or laptops each student should find as much information about his/her
friend, classmate or any chosen person as possible within 20 minutes. The information can
be found using any social networks, search engines, websites or services. When information
is found, students should present it to the group in any form. Students can conceal any piece
of information found by them that they do not want to be revealed. This task is goaled to
instruct students to use Internet as source of information. The task is also aimed at
demonstration of losses and gains of the Internet when it comes to privacy.
• Written/oral practice – 20%.
Students will need to present their own concept/idea/plan of Internet regulation. The concept
can describe any level of Internet regulation disputes: international, cross-country actions,
national cases, juridical issues, business strategies, non-profit organizations and providers
levels. The concept can be prepared as a short essay, plan or orally. Each Internet regulation
model will be discussed in class together with the lecturer.
4
PART 2. COURSE CONTENT
2.1 Course content and readings by topic
Topic 1. Development of the Internet technologies and their influence on the modern world
Lecture 1.1 Current stage of development of the Internet, management of the Internet.
Classification and typology of Internet management issues.
Summary:
History of emergence and development of the Internet. ARPANET. Internet as a military
technology. Influence of the Internet technologies on global politics and international relations.
“Broad” and “narrow” approaches to management of the Internet. The world summit concerning
information society. ICANN and ITU – disputes on control over the Internet.
Compulsory readings:
• Geist M. Governments and country-code top level domains: a global survey // Internet
Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004.
URL: http://www.michaelgeist.ca/content/view/91/64/
• Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book].
New York: Oxford University Press; 2006. Available from: eBook Academic Collection
(EBSCOhost). Pp.13-49, pp. 49-65, pp. 65-87.
• Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo
Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp. 8-62.
Further readings:
• Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/
(available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.
1-60.
Lecture 1.2 Main terms and the concepts connected with the functioning of the Internet and
new media.
Summary:
Internet infrastructure. Telecommunication infrastructure. Management protocol transfer /
Internet protocol (TCP/IP). “Root” servers. Suppliers of Internet services. Providers of services of
broadband communication. Economic models of the Internet connection. Standards of “world wide
web” (WWW). “Cloudy data processing”. Cybersafety. Enciphering. Spam.
Compulsory readings:
• Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo
Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp.33-62, pp.113-119.
• Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/
(available under a Creative Commons Attribution Noncommercial Sharealike license).
Pp.81-119.
• Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [ebook]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection
(EBSCOhost). Pp. 114-183.
Further readings:
• Sassen S. Territory, Authority, Rights: From Medieval To Global Assemblages [e-book].
Princeton, N.J.: Princeton University Press; 2008. Available from: eBook Academic
Collection (EBSCOhost). Pp.126-156.
Lecture 1.3 Challenges and threats caused by the proliferation of the Internet. Why the
Internet needs to be supervised?
5
Summary: Network and informational wars. Information wars by means of the Internet.
Internet as “world of headings”. Social networks: dangers, advantages, psychology of users. Internet
startups. Venture funds. Business on the Internet. Share of the Internet in world economy. E-money.
Seminar 1.3
Main principles of information wars on the Internet. Differences between conventional mass
media and web mass media. Is it worth opening business on the Internet? What business
opportunities does gives the Internet give? Social networks. Personal behavior online.
Compulsory readings:
• Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/
(available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.
120-138, pp. 325-334.
• Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book].
New York: Oxford University Press; 2006. Available from: eBook Academic Collection
(EBSCOhost). Pp.87-105, pp.147-163.
• Benedek W., Bauer V., Kettemann M.C. Internet Governance and the Information Society:
Global Perspectives and European Dimensions. Eleven International Publishing, 2008. Pp.931.
• Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham;
Northampton: Edward Elgar, 2013. Pp.3-71.
Further readings:
• Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [ebook]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection
(EBSCOhost). Pp.186-227.
Topic 2. The effective usage of Internet resources and national policies towards Internet
content.
Lecture 2.1 How to look for and find quality content, use interactive Internet resources and
social networks?
Summary: What are quality criteria for the websites? The use of search engines. Secret or
private life and data security on the web. Plagiarism on the Internet. How do Internet mass media
work? Print media vs Internet mass media. Debate about the international legislation for the
Internet.
Seminar 2.1
The Internet of mass media – opponent to print media? Examples of successful and
unsuccessful transitions of print media to online editions. Internet mass media legislation.
Compulsory readings:
• Mueller M., Kuerbris B., Pagé C. Democratizing global communication? Global civil
society and the campaign for communication rights in the information society //
International Journal of Communication: online academic journal. 2007. Vol 1. - URL:
http://ijoc.org/index.php/ijoc/article/view/13/39. Pp. 267-296.
• Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press,
2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons
Attribution Noncommercial Sharealike license). Pp.7-127.
• Messing S., Westwood S.J. Selective Exposure in the Age of Social Media: Endorsements
Trump Partisan Source Affiliation When Selecting News Online // Communication
Research.
2013.
URL:
http://crx.sagepub.com/content/early/2013/01/09/0093650212466406.
Internet resources:
6
• Kaarle Nordenstreng The New World Information and Communication Order: An Idea That
Refuses
to
Die
http://www.uta.fi/cmt/en/contact/staff/kaarlenordenstreng/publications/MacBride_Legacy_Is
tanbul.pdf
Lecture 2.2 International policy concerning the maintenance of materials of the Internet.
Summary: “The bill of rights on the Internet”. Copyrighting on the Internet. Freedom of
expression and the right to look for and to extend information. Control over the content and
instruments of this control. Types of materials on the Internet. Digital divide. Filtration of materials
by different governments. Cybercrimes. Control over materials by means of search engines. Web
2.0. The international organizations and the institutes regulating the Internet space: ICANN, WSIS,
UN, EU, Internet community, ITU, OECD, etc.
Seminar 2.2
Who makes decisions in the Internet sphere? Organizations regulating the Internet. Why
regulating the Internet? Fight for resources on the Internet. The US as predominant force in
cyberspace.
Compulsory readings:
• Padovani C., Nordenstreng K. From NWICO to WSIS: another world information and
communication order? // Global Media and Communication. 2005. Vol. 1, № 3. P. 264-272.
• Kleinwächter W. Beyond ICANN Vs ITU?: How WSIS Tries to Enter the New Territory of
Internet Governance // Gazette: The International Journal For Communication Studies.
2004. Vol. 66(3–4). P. 233–251. - URL: http://gaz.sagepub.com/content/66/3-4/233. Pp.3153.
• Geist M. Governments and country-code top level domains: a global survey // Internet
Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004.
URL: http://www.michaelgeist.ca/content/view/91/64/. Pp.282-291.
Further readings:
• Агейчев А.С., «iGovernance. Управление Интернетом: теория и история вопроса». М.:
ИПО «У Никитских ворот», 2013. Стр. 36-59, 102-130.
• Peake, A. Internet governance and the World Summit on the Information Society (WSIS): A
report prepared for the Association for Progressive Communications, 2004. URL:
http://www.apc.org/en/pubs/issue/internet-governance-and-world-summit-information-s.
Lecture 2.3 Russian experience of Internet governance.
Summary: “Black lists” of websites. The problem of taxes on earnings in blogs. Bloggers of
the “fourth power”. Participation of Russia in WSIS. Participation of Russia in global dialogue on
Internet management. The Internet in Russia. Social networks in Russia. How “Runet” differs from
the Internet in other countries.
Seminar 2.3
Spam in “Runet”. How Russia participates in WSIS. Position of Russia concerning Internet
regulation. Russian government vs bloggers and new media.
Compulsory readings:
• Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press,
2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons
Attribution Noncommercial Sharealike license). Pp.67-127.
• Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham;
Northampton: Edward Elgar, 2013. Pp.143-198.
7
• Bartell D, Sullivan R. Future of the Internet: Social Networks, Policy Issues, and Learning
Tools [e-book]. New York: Nova Science Publishers; 2011. Available from: eBook
Academic Collection (EBSCOhost). Pp.1-23.
Topic 3. Socio-cultural aspects of Internet proliferation and development.
Lecture 3.1 Behavior of the user in cyberspace.
Summary: Anonymity and impunity phenomenon on the Internet. Reasons of popularity of
social networks and blogs. Dependence of a political situation on activity of bloggers. Why
politicians use social networks? Is it necessary to regulate social networks? The legislation on social
networks. Balance between private and public interests. Election campaigns on the Internet. Social
media impact on business and politics.
Seminar 3.1
Why users dare to tell anything on the Internet? Elections under network influence. The state
and the Internet – friends or foes? How bloggers influence state policies. The American election
campaigns on the Internet.
Compulsory readings:
• Benkler Y. The wealth of networks: how social production transforms markets and freedom.
New
Haven:
Yale
University
Press,
2006.
URL:
http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative
Commons Attribution Noncommercial Sharealike license). Pp. 59-91, pp. 176-273, pp. 91133.
• Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo
Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp.123-132.
• Eltantawy N., Wiest J.B. Social Media in the Egyptian Revolution: Reconsidering Resource
Mobilization Theory // International Journal of Communication: online academic journal.
2011. Vol 5. - URL: http://ijoc.org/index.php/ijoc/article/view/1242/597
• Chavez J. #Fail: The Misuse of Social Media in the 2012 US Presidential Campaign, 2012.
URL: http://www.tcd.ie/policy-institute/events/DV12_Chavez.php
Further readings:
• Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press,
2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons
Attribution Noncommercial Sharealike license). Pp.127-149.
Lecture 3.2 The principles of influence of Internet content and Internet resources on
communication and behavior.
Summary:
Ads on the Internet. New media tradition on the Internet. Safety of children on the Internet.
Ads and PR in social networks. Use of social networks by children. Transition of a virtual content
to the sphere of the real. The reason of popularity of certain YouTube videos. Interrelation between
Internet and traditional mass media content. Internet terrorism.
Seminar 3.2
New formats of advertizing on the Internet. User behavior in social networks. Types of
cybercrimes. Fight against low-quality content.
Compulsory readings:
• Price M. Media And Sovereignty: The Global Information Revolution And Its Challenge To
State Power [e-book]. Cambridge, Mass: MIT Press; 2002. Available from: eBook
Academic Collection (EBSCOhost). Pp. 4-35.
• Benkler Y. The wealth of networks: how social production transforms markets and freedom.
New
Haven:
Yale
University
Press,
2006.
URL:
http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative
8
Commons Attribution Noncommercial Sharealike license). Pp. 59-91, pp. 176-273, pp. 91133.
• Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press,
2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons
Attribution Noncommercial Sharealike license). Pp.200-235.
• Political Polarization on Twitter / M.D. Conover et al., Indiana University, Center for
Complex
Networks
and
Systems
Research,
2011.
URL:
http://truthy.indiana.edu/site_media/pdfs/conover_icwsm2011_polarization.pdf.
2.2 Essay topics
1. How Internet technologies influence behavior and communication of people? New opportunities
and new threats.
2. The Internet democracy or the Internet authoritarianism – why it is necessary to regulate the
Internet.
3. Copyright on the Internet.
4. Who regulates the Internet space?
5. Can states elaborate international legislation over the Internet?
6. Where on the Internet the freedom of one begins, and freedom of another comes to an end?
7. The Internet technologies in election campaigns.
8. Digital divide: is Internet the privilege of the rich?
9. Fight for virtual resources.
10. Advertizing as the progress engine on the Internet. Differences of advertizing on websites and in
conventional media.
2.3 Final test timing
• Autumn semester tests – last week of October.
2.4 Consolidated reading list (in alphabetic order)
Compulsory reading list:
•
Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo Foundation,
2005. URL: http://www.diplomacy.edu/IGBook
•
Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/
(available under a Creative Commons Attribution Noncommercial Sharealike license).
•
Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham;
Northampton: Edward Elgar, 2013.
Further reading list:
•
Bartell D, Sullivan R. Future of the Internet: Social Networks, Policy Issues, and Learning
Tools [e-book]. New York: Nova Science Publishers; 2011. Available from: eBook Academic
Collection (EBSCOhost).
•
Benedek W., Bauer V., Kettemann M.C. Internet Governance and the Information Society:
Global Perspectives and European Dimensions. Eleven International Publishing, 2008.
•
Benkler Y. The wealth of networks: how social production transforms markets and freedom.
New Haven: Yale University Press, 2006. URL:
http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative
Commons Attribution Noncommercial Sharealike license)
9
•
Eltantawy N., Wiest J.B. Social Media in the Egyptian Revolution: Reconsidering Resource
Mobilization Theory // International Journal of Communication: online academic journal. 2011.
Vol 5. - URL: http://ijoc.org/index.php/ijoc/article/view/1242/597
•
Geist M. Governments and country-code top level domains: a global survey // Internet
Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004. URL:
http://www.michaelgeist.ca/content/view/91/64/
•
Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book].
New York: Oxford University Press; 2006. Available from: eBook Academic Collection
(EBSCOhost).
•
Kleinwächter W. Beyond ICANN Vs ITU?: How WSIS Tries to Enter the New Territory of
Internet Governance // Gazette: The International Journal For Communication Studies. 2004.
Vol. 66(3–4). P. 233–251. - URL: http://gaz.sagepub.com/content/66/3-4/233
•
Messing S., Westwood S.J. Selective Exposure in the Age of Social Media: Endorsements
Trump Partisan Source Affiliation When Selecting News Online // Communication Research.
2013. URL: http://crx.sagepub.com/content/early/2013/01/09/0093650212466406
•
Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [e-book].
Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection
(EBSCOhost).
•
Mueller M., Kuerbris B., Pagé C. Democratizing global communication? Global civil society
and the campaign for communication rights in the information society // International Journal of
Communication: online academic journal. 2007. Vol 1. - URL:
http://ijoc.org/index.php/ijoc/article/view/13/39
•
Padovani C., Nordenstreng K. From NWICO to WSIS: another world information and
communication order? // Global Media and Communication. 2005. Vol. 1, № 3. P. 264-272.
•
Price M. Media And Sovereignty: The Global Information Revolution And Its Challenge To
State Power [e-book]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic
Collection (EBSCOhost).
•
Sassen S. Territory, Authority, Rights: From Medieval To Global Assemblages [e-book].
Princeton, N.J.: Princeton University Press; 2008. Available from: eBook Academic Collection
(EBSCOhost).
•
Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press,
2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons
Attribution Noncommercial Sharealike license)
•
Агейчев А.С. iGovernance. Управление Интернетом: теория и история вопроса. М.: ИПО
«У Никитских ворот», 2013.
Internet resources:
•
Chavez J. #Fail: The Misuse of Social Media in the 2012 US Presidential Campaign, 2012.
URL: http://www.tcd.ie/policy-institute/events/DV12_Chavez.php
•
Kaarle Nordenstreng The New World Information and Communication Order: An Idea That
Refuses to Die
http://www.uta.fi/cmt/en/contact/staff/kaarlenordenstreng/publications/MacBride_Legacy_Istan
bul.pdf
10
•
Peake, A. Internet governance and the World Summit on the Information Society (WSIS): A
report prepared for the Association for Progressive Communications, 2004. URL:
http://www.apc.org/en/pubs/issue/internet-governance-and-world-summit-information-s
•
Political Polarization on Twitter / M.D. Conover et al., Indiana University, Center for Complex
Networks and Systems Research, 2011. URL:
http://truthy.indiana.edu/site_media/pdfs/conover_icwsm2011_polarization.pdf
11
PART 3. FINAL REMARKS
• Plagiarism is considered as a severe violation and as an indication of incompetence in the
course. Plagiarism is understood as making of one’s text using compilation method for other
people’s publications, even connected with own phrases and sentences. Collective
performance of individual tasks is also unacceptable. Proved plagiarism an F-mark is given
regardless of the fulfillment of all other requirements.
• Assignments are to be handed in on the due date. Late submissions will translate into the
lowering of the grade by 1/3 of a grade for each day of delay.
• Students are asked to keep a copy of all work submitted for evaluation.
12
Download